Unit 3: Web Browsers, Email, and Safe Computing

Ace your homework & exams now with Quizwiz!

List three common email scams:

dating scams, investment schemes, claims you won the lottery.

Antivirus software is a computer program that _____, _______, and _________ to disarm or remove malicious software programs.

detects, prevents, takes action

what are steps you can take to protect your passwords?

don't use information that is personal or easy to guess. Don't share your passwords with anymore. Change your password frequently or use a different password for every site.

where would you find a message that you did not finish writing?

drafts

The primary goal of an internet scam is just to tease someone with fake information. True ____ False _____

false

Emails can be organized into _________. Instead of folders, Gmail uses _______ to organize email messages.

files label

what does the inbox do?

hold the emails you receive

what does the host identify?

identifies the resources (network device computer, web page)

what does the location in a URL identify?

identifies where to find a resource on the host.

What is a network application?

is a computer application in which either the program you are using, the data you are working with, or both, are on a network.

What is phishing?

is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers.

what is malware?

is software that has malicious intent.

what is hacking?

is the act of cracking into a computer to steal information.

what are two reasons for using an address book?

save and look up people names, email address, and other contact information. you don't have to remember everyone's email addresses.

What is the internet term for junk mail?

spam

List three ways you might spot a computer virus.

subject line, attachment, and sender.

what is protocol?

the language computers use to "talk" to one another.

who is the recipient?

the person to whom the email is being sent.

what does URL stand for?

uniform resource locator

Strong passwords may include these elements:

upper and lower case letters numbers and symbols 8 or more characters

List two examples of network applications:

web browser and email

what is the difference between the archive and trash folders?

Archiving an email gets the message out of your inbox folder, but saves the email message so that you can always find it later. Putting a message in the trash folders gets the message ready to be deleted.

What does Bcc stand for, and why would you use it?

Blind Carbon Copy. to hide the multiple recipients' email address.

list two ways that malware can be shared:

E-mail attachments, fictitious websites.

_______ spread from one machine to another, rapidly, without human action.

Worms

what is an attachment?

a file that is sent along with an email message.

List four ways to avoid hacking/malware attacks?

a. do not open emails or attachments from unfamiliar email addresses. b. questions suspicious attachments from people you know. c. right-click the pop-up taskbar to use the task manager to close pop-up ads. d. use tools to prevent viewing potentially dangerous sites.

write the correct term after each letter: http://www.mydomain.com/foldername/filename.html ______ ____________________________ ______________________________ a. b. c.

a. protocol b. host c. location

what is forwarding?

an email sends the email you just read to a new recipient.

what is a web browser?

are networks appilcations used to access the internet.

what does Cc stand for, and why would you use it?

carbon copy. when you want to send an email to someone, and send the exact same copy of the email to one or more other people.

A ______________ attaches itself to a file or program, enabling it to spread form one computer to another.

computer virus

An address book is also called _______

contact list


Related study sets

NU220 Chapter 18: Drug Therapy With Beta-Lactam Antibacterial Agents

View Set

Exam #4 Adult Health 2 (chapters 49, 50, 53, 54 and 55)

View Set

Accounting Chapter 8 before final

View Set

GI, Chapter 47: Management of Patients With Intestinal and Rectal Disorders, Prep U--Ch. 47: Mgmt of Patients With Intestinal and Rectal Disorders

View Set

Ch. 48 Skin integrity and Wound Care

View Set

#2 Checkpoint Exam: Network Access

View Set